Reed Elsevier

Displaying 1-40 of 1000 results

  • White Papers // May 2012

    An Energy-Centric Handover Decision Algorithm for the Integrated LTE Macrocell - Femtocell Network

    Femtocells are attracting a fast increasing interest now-a-days, as a promising solution to improve indoor coverage and system capacity. Due to the short transmit-receive distance, femtocells can greatly lower transmit power, prolong handset battery life, and enhance the user-perceived Quality of Service (QoS). On the other hand, technical challenges still...

    Provided By Reed Elsevier

  • White Papers // May 2012

    Reducing Virtual-to-Physical Address Translation Overhead in Distributed Shared Memory Based Multi-Core Network-on-Chips According to Data Property

    In Network-on-Chip (NoC) based multi-core platforms, Distributed Shared Memory (DSM) preferably uses virtual addressing in order to hide the physical locations of the memories. However, this incurs performance penalty due to the Virtual-To-Physical (V2P) address translation overhead for all memory accesses. Based on the data property which can be either...

    Provided By Reed Elsevier

  • White Papers // Apr 2012

    Node Localization Through Physical Layer Network Coding: Bootstrap, Security, and Accuracy

    Previous research on Physical-layer Network Coding (PNC) focuses on the improvements in bandwidth usage efficiency. Its capability to assist wireless nodes in localization was first discussed. In that paper, however, the authors discussed only the basic idea to detect and separate the interfered signals for calculating the node positions. Many...

    Provided By Reed Elsevier

  • White Papers // Apr 2012

    A Green Handover Protocol in Two-Tier OFDMA Macrocell - Femtocell Networks

    Femtocells are a promising technology to improve network performance with the short-range, low-power, and cost-beneficial small base stations. A femtocell is a low-power wireless access point that operates in licensed spectrum to connect a standard device to an operator's network using a Digital Subscriber Line (DSL) connection. Most of the...

    Provided By Reed Elsevier

  • White Papers // Mar 2012

    Secure Neighbor Discovery and Wormhole Localization in Mobile Ad Hoc Networks

    Neighbor discovery is an important part of many protocols for wireless ad hoc networks, including localization and routing. When neighbor discovery fails, communications and protocols performance deteriorate. In networks affected by relay attacks, also known as wormholes, the failure may be more subtle. The wormhole may selectively deny or degrade...

    Provided By Reed Elsevier

  • White Papers // Mar 2012

    Network Coding-Based Cooperative ARQ Scheme for VANETs

    In this paper, the authors introduce a novel network coding-based Medium Access Control (MAC) protocol for Vehicular Ad-hoc NETworks (VANETs) that use cooperative Automatic Repeat reQuest (ARQ) techniques. Their protocol coordinates the channel access among a set of relays capable of using network coding in order to minimize the number...

    Provided By Reed Elsevier

  • White Papers // Mar 2012

    Towards a Reputation-Based Routing Protocol to Contrast Blackholes in a Delay Tolerant Network

    A Delay Tolerant Network (DTN) relies on the implicit assumption that nodes cooperate towards message forwarding. However, this assumption cannot be satisfied when there are malicious nodes acting as blackholes and voluntarily attracting and dropping messages. In this paper, the authors propose a reputation-based protocol for contrasting blackholes. Every node...

    Provided By Reed Elsevier

  • White Papers // Mar 2012

    Methodology for Public Administrators for Selecting Between Open Source and Proprietary Software

    The public sector needs to change over to communicating digitally. This development makes great demands both on work processes in the public sector and on the Information Technology systems, on which e-government is based. From the economic perspective, the change-over poses great challenges, as huge investments will have to be...

    Provided By Reed Elsevier

  • White Papers // Mar 2012

    A Bandwidth and Effective Hit Optimal Cache Scheme for Wireless Data Access Networks With Client Injected Updates

    In this paper, the authors propose an optimal cache replacement policy for data access applications in wireless networks where data updates are injected from all the clients. The goal of the policy is to increase effective hits in the client caches and in turn, make efficient use of the network...

    Provided By Reed Elsevier

  • White Papers // Feb 2012

    Towards Mobile Intelligence: Learning From GPS History Data for Collaborative Recommendation

    With the increasing popularity of location-based services, the authors have accumulated a lot of location data on the Web. In this paper, the authors are interested in answering two popular location-related queries in their daily life: if the people want to do something such as sightseeing or dining in a...

    Provided By Reed Elsevier

  • White Papers // Feb 2012

    A Simulation Modelling Tool for Distributed Virtual Environments

    Distributed Virtual Environments simulate the behavior and activities of a great number of users interacting in a virtual world over a wide area network. The size of the virtual worlds and the tremendous number of users that these environments are called to support require additional bandwidth and computational resources. For...

    Provided By Reed Elsevier

  • White Papers // Feb 2012

    Sleep-Based Topology Control in the Ad Hoc Networks by Using Fitness Aware Learning Automata

    Learning automata have been found to be useful in the systems with incomplete knowledge. Therefore, it can be used as a tool to solve problems of Ad Hoc networks, where nodes are mobile and operate within a dynamic environment, which entails possibly unknown and time varying characteristics. In this paper,...

    Provided By Reed Elsevier

  • White Papers // Jan 2012

    Team Formation and Steering Algorithms for Underwater Gliders Using Acoustic Communications

    In order to take measurements in space and time from the under-sampled vast ocean, it is necessary to employ multiple autonomous underwater vehicles, such as gliders, that communicate and coordinate with each other. These vehicles need to form a team in a specific formation, steer through the 3D region of...

    Provided By Reed Elsevier

  • White Papers // Jan 2012

    Referential Integrity Quality Metrics

    Referential integrity is an essential global constraint in a relational database, that maintains it in a complete and consistent state. In this paper, the authors assume the database may violate referential integrity and relations may be de-normalized. They propose a set of quality metrics, defined at four granularity levels: database,...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    A Historical Probability Based Noise Generation Strategy for Privacy Protection in Cloud Computing

    Cloud computing promises an open environment where customers can deploy IT services in pay-as-you-go fashion while saving huge capital investment in their own IT infrastructure. Due to the openness, various malicious service providers can exist. Such service providers may record service requests from a customer and then collectively deduce the...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    ActiSen: Activity-Aware Sensor Network in Smart Environments

    A sensor network, unlike a traditional communication network, provides high degree of visibility into environmental physical processes. Therefore, its operation is driven by the activities in the environment. In long-term operations, these activities usually show certain patterns which can be learned and utilized to optimize network design. However, this has...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    Efficient Audit Service Outsourcing for Data Integrity in Clouds

    Cloud-based outsourced storage relieves the client's burden for storage management and maintenance by providing a comparably low-cost, scalable, location-independent platform. However, the fact that clients no longer have physical possession of data indicates that they are facing a potentially formidable risk for missing or corrupted data. To avoid the security...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    Practical and Secure Localization and Key Distribution for Wireless Sensor Networks

    In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with legitimate in-network communication. In this paper, the authors introduce Secure Walking GPS, a practical and cost effective secure localization and key distribution solution for...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    A Structural Approach for PoP Geo-Location

    Inferring PoP level maps is gaining interest due to its importance to many areas, e.g., for tracking the Internet evolution and studying its properties. In this paper, the authors introduce a novel structural approach to automatically generate large scale PoP level maps using trace-route measurement from multiple locations. The PoPs...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    Talent Scouting in P2P Networks

    Record labels would like to identify potential artists as early as possible in their career, before other companies approach the artists with competing contracts. However, there are a huge number of new artists, and the process of identifying the ones with high success potential is labor intensive. This paper demonstrates...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    Low-Dimensional Signal-Strength Fingerprint-Based Positioning in Wireless LANs

    Accurate location awareness is of paramount importance in most ubiquitous and pervasive computing applications. Numerous solutions for indoor localization based on IEEE802.11, Bluetooth, ultrasonic and vision technologies have been proposed. This paper introduces a suite of novel indoor positioning techniques utilizing Signal-Strength (SS) fingerprints collected from Access Points (APs). The...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    ORACLE: Mobility Control in Wireless Sensor and Actor Networks

    Mobile actor is a promising tool for Wireless Sensor and Actor Networks (WSANs) provisioning energy and time efficient data collection. In this paper, the authors study actors' mobility control in WSANs for efficient events detecting in terms of time and energy consumption. They introduce an innovative approach ORACLE, to make...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    A Pure Embedding of Attribute Grammars

    Attribute grammars are a powerful specification paradigm for many language processing tasks, particularly semantic analysis of programming languages. Recent attribute grammar systems use dynamic scheduling algorithms to evaluate attributes on demand. In this paper, the authors show how to remove the need for a generator, by embedding a dynamic approach...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    A Trust Negotiation Based Security Framework for Service Provisioning in Load-Balancing Clusters

    The OKKAM project aims at enabling the Web of Entities, a global digital space for publishing and managing information about entities. The project provides a scalable and sustainable infrastructure, called the Entity Name System (ENS), for the systematic reuse of global and unique entity identifiers. The ENS provides a collection...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    On Scrambling the Burrowse-Wheeler Transform to Provide Privacy in Lossless Compression

    The usual way of ensuring the confidentiality of the compressed data is to encrypt it with a standard encryption algorithm. Although the computational cost of encryption is practically tolerable in most cases, the lack of flexibility to perform pattern matching on the compressed data due to the encryption level is...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    QoS and Preemption Aware Scheduling in Federated and Virtualized Grid Computing Environments

    Resource provisioning is one of the challenges in federated Grid environments. In these environments each Grid serves requests from external users along with local users. Recently, this resource provisioning is performed in the form of Virtual Machines (VMs). The problem arises when there are insufficient resources for local users to...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    A Robust Hashing Algorithm Based on SURF for Video Copy Detection

    To protect digital video from unauthorized use, video copy detection is an active research topic in the field of copyright control. For content-based copy detection, the key issue is to extract robust transformation-invariant feature. In this paper, a robust hashing algorithm based on Speeded Up Robust Feature (SURF) and Ordinal...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    A Semantically Enhanced Service Repository for User-Centric Service Discovery and Management

    User centricity represents a new trend in the currently flourishing service oriented computing era. By upgrading end-users to prosumers (producer+consumer) and involving them in the process of service creation, both service consumers and service providers can benefit from a cheaper, faster, and better service provisioning. The EU-IST research project OPUCE...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    Tracing and Revoking Scheme for Dynamic Privileges Against Pirate Rebroadcast

    Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel so that only the qualified users can recover the data. Currently, there are only two broadcast encryption schemes designed for users with different privileges. In these schemes, users with higher privileges can decrypt...

    Provided By Reed Elsevier

  • White Papers // Oct 2011

    100GbE and Beyond for Warehouse Scale Computing Interconnects

    Increasing broadband penetration in the last few years has resulted in a dramatic growth in innovative, bandwidth-intensive applications that have been embraced by the consumers. Coupled with this consumer trend is the migration from local compute/storage model to a cloud computing paradigm. As computation and storage continues to move from...

    Provided By Reed Elsevier

  • White Papers // Oct 2011

    Long-Term Availability Prediction for Groups of Volunteer Resources

    Volunteer computing uses the free resources in Internet and Intranet environments for large-scale computation and storage. Currently, 70 applications use over 12 Peta-FLOPS of computing power from such platforms. However, these platforms are currently limited to embarrassingly parallel applications. In an effort to broaden the set of applications that can...

    Provided By Reed Elsevier

  • White Papers // Oct 2011

    Looking Ahead in Pervasive Computing: Challenges and Opportunities in the Era of Cyber - Physical Convergence

    The physical environment is becoming more and more saturated with computing and communication entities that interact among themselves, as well as with users: virtually everything will be enabled to source information and respond to appropriate stimuli. In this technology-rich scenario, real-world components interact with cyberspace via sensing, computing and communication...

    Provided By Reed Elsevier

  • White Papers // Oct 2011

    Biconnecting a Network of Mobile Robots Using Virtual Angular Forces

    This paper addresses the problem of self-deploying a swarm of wireless mobile robots in a biconnected fashion. The motivations for deploying robotic sensor networks in general include accessing places where human cannot go (e.g. remote planets, underwater area, dangerous spots with chemical or radioactive leaks), or automating fastidious large scale...

    Provided By Reed Elsevier

  • White Papers // Oct 2011

    Compressive Sampling Based Differential Detection for UWB Impulse Radio Signals

    Non-coherent detectors significantly contribute to the practical realization of the UltraWide-Band (UWB) Impulse-Radio (IR) concept, in that they allow avoiding channel estimation and provide highly efficient reception capabilities. Complexity can be reduced even further by resorting to an all-digital implementation, but Nyquist-rate sampling of the received signal is still required....

    Provided By Reed Elsevier

  • White Papers // Sep 2011

    TDMA Scheduling for Event-Triggered Data Aggregation in Irregular Wireless Sensor Networks

    Multi-hop wireless sensor networks often use a TDMA schedule to collect data periodically from multiple locations within a large area. If the measurements from neighboring sensors are cross-correlated, they can be aggregated and compressed as they travel to the data sink. In order for data aggregation to occur quickly, the...

    Provided By Reed Elsevier

  • White Papers // Sep 2011

    Content Delivery and Caching From a Network Provider's Perspective

    An ongoing challenge in telecommunication is to integrate a variety of services on broadband access platforms at increasing transmission speed. Traditional Internet services, such as file transfer, email and web browsing, are now running on common multi-service IP platforms together with voice, video and television over IP, online gaming, P2P...

    Provided By Reed Elsevier

  • White Papers // Sep 2011

    Session Level Flow Classification by Packet Size Distribution and Session Grouping

    Classifying traffic into specific network applications is essential for application-aware network management and it becomes more challenging because modern applications complicate their network behaviors. While port number-based classifiers work only for some well-known applications and signature-based classifiers are not applicable to encrypted packet payloads, researchers tend to classify network traffic...

    Provided By Reed Elsevier

  • White Papers // Sep 2011

    Research Challenges Towards the Future Internet

    The convergence of computer-communication networks towards an all-IP integrated network has transformed Internet in a commercial commodity that has stimulated an un-precedent offer of novel communication services that are pushing the Internet architecture and protocols well beyond their original design. This calls for extraordinary research efforts at all levels of...

    Provided By Reed Elsevier

  • White Papers // Sep 2011

    A New Adaptive Receiver-Initiated Scheme for Mitigating Starvation in Wireless Networks

    Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) has been adopted by the IEEE 802.11 standard and provides good performance when all transmitters are within the range of each other. Unfortunately, in multi-hop topologies, the asymmetric view of the channel state leads to a throughput distribution where a few flows...

    Provided By Reed Elsevier

  • White Papers // Aug 2011

    TCP Slow Start With Fair Share of Bandwidth

    The initial start-up performance of TCP largely depends on two parameters - ssthresh and cwnd. When these values are not accurate, TCP cannot utilize the bandwidth fully or may generate multiple packet drops. Unfortunately, estimating these parameters is not easy since little network state information is available for the TCP...

    Provided By Reed Elsevier

  • White Papers // Apr 2002

    New Advances in Polymer/ Layered Silicate Nanocomposites

    This review discusses some recent advances in polymer silicate Nan composites. In particular, we highlight the properties of specific Nan composites while emphasizing the lack of properties trade-offs in these systems. The paper also presents in detail the work on the structure and dynamics of the polymer/ nanofiller interface and...

    Provided By Reed Elsevier

  • White Papers // Dec 2003

    An fMRI Study of Semantic Processing in Men With Schizophrenia

    As a means toward understanding the neural bases of schizophrenic thought disturbance, we examined brain activation patterns in response to semantically and superficially encoded words in patients with schizophrenia. Nine male schizophrenic and 9 male control subjects were tested in a visual levels of processing (LOP) task first outside the...

    Provided By Reed Elsevier

  • White Papers // Feb 2001

    Volumetric Quantification of Brain Swelling After Hypobaric Hypoxia Exposure

    Conventional qualitative interpretation of two-dimensional cross-sectional MR images gives information about the localization and extension of edematous tissue in patients with brain edema. Changes in adjacent brain slices allow an approximate evaluation of the brain volume. Other approaches in characterization of brain edema are T2 mapping, diffusion weighted imaging, or...

    Provided By Reed Elsevier

  • White Papers // Feb 2002

    A Comparative Study on Aseismic Performances of Base Isolation Systems for Multi-Span Continuous Bridge

    The recommended ranges of the design parameters are presented in this study. The design parameters such as the first natural period of the isolated bridge and the friction coefficient of the bearing are determined by the reciprocal relationship between the peak deck displacement and the peak overturning moment of the...

    Provided By Reed Elsevier

  • White Papers // Feb 2004

    Organic Matter Adsorption on Montmorillonite Pillared b an Organophile Complex for Tangential Microfiltration Through a Zro2-Tio2 Inorganic Membrane

    Adsorption of organic matter (humic and fulvic acids) at 10 mg/l onto a montmorillonite combined pillared by ABPC and a cationic surface-active CTAB turns out to be comparable and even better than adsorption onto an active carbon under the same conditions. The efficiency reaches levels of 95%. On the other...

    Provided By Reed Elsevier

  • White Papers // Sep 2003

    Synthesis of Polysiloxane-Imide Membranes -Application to the Extraction of Organics From Water Mixtures

    The synthesis of new copolysiloxane-imide polymers was carried out from a, w-dimethylsiloxane oligomers and aromatic di-anhydrides (PMDA and 6FDA) to obtain soluble siloxane-imide based polymers (PSI) endowed both with organophile properties and good physical membrane properties. Synthesized PSI block copolymers had high weight contents of siloxane residue varying from 70...

    Provided By Reed Elsevier

  • White Papers // Oct 2002

    Effects of Condylar Fibro-Cartilage on the Biomechanical Loading of the Human Temporomandibular Joint in a Three-Dimensional, Nonlinear Finite Element Model

    The present study was undertaken to test a hypothesis that the addition of articular fibro cartilage in the condyle of the temporomandibular joint reduces three-dimensional stress distribution in the condyle, the disc and articular eminence. A three-dimensional, nonlinear finite-element model was developed for analysis of joint loading before and after...

    Provided By Reed Elsevier

  • White Papers // May 2002

    Development of a Self-Consolidating Engineered Cementitious Composite Employing Electrosteric Dispersion/Stabilization

    A self-consolidating engineered cementitious composite (ECC) reinforced with hydrophobic polyethylene fibers has been developed by combining micromechanics based design and rheological design, in a compatible manner. The previously developed micromechanics based design selects material ingredients for tensile ductility in the hardened state. The rheological design, which the focus in this...

    Provided By Reed Elsevier

  • White Papers // Feb 2001

    Saving of Energy and Cost in Seawater Desalination With Speed Controlled Pumps

    The paper describes for RO, MSF and MED plants the technical arrangement possibilities for speed control systems for small and large pumps and compares the energy consumption with conventional arrangements. It is demonstrated that for RO high pressure pumps speed control results always into an overall cost saving and for...

    Provided By Reed Elsevier

  • White Papers // Jun 2004

    The Effect of Multi-Purpose Shopping on Pricing and Location Strategy for Grocery Stores

    Though it is a well-accepted fact that consumers indulge in multi-purpose shopping, most previous models of store choice assume that grocery shopping trips are single-purpose trips. This paper provides the first empirical analysis of multi-purpose shopping using data on actual shopping trips. A latent class factor analytic logit model is...

    Provided By Reed Elsevier

  • White Papers // Apr 2005

    HR Drives Winning Formula

    Most engineers jump at the chance to work in the automotive industry. It is an opportunity to push their skills to the limit, as today's top-of-the-range cars use leading edge technology. This is particularly true in motor sports, where cars are required to perform at the highest level under extreme...

    Provided By Reed Elsevier

  • White Papers // Nov 2004

    Deciding When to Switch Tasks in Time - Critical Multitasking

    While cognitive modeling has begun to make good progress in accounting for human multitasking behavior, current models typically focus on externally-driven task switching in laboratory-task settings. In contrast, many real-world complex tasks, particularly time-critical ones, involve internally-driven multitasking in which people themselves decide when to switch between tasks. This paper...

    Provided By Reed Elsevier

  • White Papers // Jun 2008

    Value-Based Predicate Filtering of XML Documents

    Publish-subscribe systems based on XML filtering have received much attention in ubiquitous computing environments and Internet applications. The main challenge is to process a large number of content against millions of user subscriptions. Several XML filtering systems focus on the efficient processing of structural matching of user subscriptions represented as...

    Provided By Reed Elsevier

  • Webcasts // May 2009

    Tapping Into the Power of Unified Communications Securely

    Unified Communications has become a powerful mainstream business resource, permitting rapid and cost-effective communication between internal and external staff alike. But, along with improved productivity, the use of Unified Communications software such as Microsoft Office Communications Server (OCS) has brought with it a new range of security threats that few...

    Provided By Reed Elsevier

  • Webcasts // Apr 2009

    Top IT Security Threats: How to Protect Your Users From Increasingly Sophisticated Attacks

    High-profile data breaches frequent the headlines, with countless smaller incidents happening almost daily. Data is under attack, and the frequency of assaults and sophistication of the methods employed are increasing. Rather than targeting the network directly, hackers often exploit the most vulnerable part of the security ecosystem - the users....

    Provided By Reed Elsevier

  • Webcasts // Mar 2009

    Web 2.0 Security in the Spotlight

    The Internet has changed. It's no longer just about Web browsing. It's dominated by Web 2.0 applications such as instant messaging, social networking, P2P, voice and video. Standalone URL filtering solutions are no longer sufficient to control these applications and secure the network. One needs a secure Web gateway that...

    Provided By Reed Elsevier

  • Webcasts // Jan 2009

    From Web Browsing to Social Networking: Securing Employee Internet Use in a Web 2.0 World

    The Internet has changed. It is no longer about e-mail and web browsing. Instead Internet traffic is dominated by Web 2.0 applications such as Video, Voice, IM (Instant Messaging), P2P, and social networking. These consumer-oriented applications are introduced by employees in the workplace to gain efficiencies, but they circumvent existing...

    Provided By Reed Elsevier

  • Webcasts // Nov 2008

    Making Threat Management More Manageable

    Human factors, often unaccounted for and masked by IDS products, and operations in the trenches, can create holes in intelligence coverage and performance gaps in incident operations. But, what role, in these modern integrated IT security times, does IDS plan in the great scheme of things? This webcast will help...

    Provided By Reed Elsevier

  • White Papers // May 2010

    Accelerating Electrostatic Surface Potential Calculation With Multi-Scale Approximation on Graphics Processing Units

    Tools that compute and visualize biomolecular electrostatic surface potential have been used extensively for studying biomolecular function. However, determining the surface potential for large biomolecules on a typical desktop computer can take days or longer using currently available tools and methods. Two commonly used techniques to speed-up these types of...

    Provided By Reed Elsevier

  • White Papers // Feb 2009

    Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness

    Secure management of information systems is crucially important in information intensive organizations. Although most organizations have long been using security technologies, it is well known that technology tools alone are not sufficient. Thus, the area of end-user security behaviors in organizations has gained an increased attention. In information security observing...

    Provided By Reed Elsevier

  • White Papers // Jun 2010

    The Price of Security in Wireless Sensor Networks

    With the increased application of Wireless Sensor Networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Several security mechanisms, such as TinySec, have been introduced to address the need for security in WSNs. The cost of security, however, still mostly...

    Provided By Reed Elsevier

  • White Papers // Jun 2010

    Routing in Cognitive Radio Networks: Challenges and Solutions

    Cognitive Radio Networks (CRNs) are composed of cognitive, spectrum-agile devices capable of changing their configurations on the fly based on the spectral environment. This capability opens up the possibility of designing flexible and dynamic spectrum access strategies with the purpose of opportunistically reusing portions of the spectrum temporarily vacated by...

    Provided By Reed Elsevier

  • White Papers // May 2008

    FCS/nORB: A Feedback Control Real-Time Scheduling Service for Embedded ORB Middleware

    Object Request Broker (ORB) middleware has shown promise in meeting the functional and real-time performance requirements of Distributed Real-time and Embedded (DRE) systems. However, existing real-time ORB middleware standards such as RT-CORBA do not adequately address the challenges of managing unpredictable workload, and providing robust performance guarantees portably across different...

    Provided By Reed Elsevier

  • White Papers // Mar 2010

    An Automatic HTTP Cookie Management System

    HTTP Cookies, also known as Web cookies or just cookies, are small parcels of text sent by a server to a web browser and then sent back unchanged by the browser if it accesses that server again. Cookies are originally designed to carry information between servers and browsers so that...

    Provided By Reed Elsevier

  • White Papers // Jun 2010

    An Efficient and Lightweight Method for Service Level Agreement Assessment

    Traditional approaches to on-line end-to-end Service Level Agreement (SLA) assessment have focused on the estimation of network QoS parameters. These approaches, however, face a trade-off between accuracy and the amount of resources needed to achieve such accuracy. This paper offers an alternative approach, where instead of estimating QoS parameters, the...

    Provided By Reed Elsevier

  • White Papers // Nov 2010

    VFire: Immersive Wildfire Simulation and Visualization

    Every year, wildfires destroy millions of acres of land and cost millions if not billions of dollars to control. From 2000 to 2002, over 18 million acres were burned, over 2000 structures were destroyed, and over 3.4 billion dollars were expended just for suppression efforts. Beyond the immediate damage caused...

    Provided By Reed Elsevier

  • White Papers // Oct 2008

    Modeling the Effect of Node Synchronization Times in Ultra Wideband Wireless Networks

    Ultra-WideBand wireless (UWB) can provide the physical layer for high-throughput personal area networks. When UWB is used for communication between many nodes, relatively long acquisition times are needed when dropping and re-establishing wireless links between the nodes. This paper describes the development and use of mathematical and simulation models to...

    Provided By Reed Elsevier

  • White Papers // May 2009

    The Efficient Use of Enterprise Information for Strategic Advantage: A Data Envelopment Analysis

    A majority of manufacturers make use of some form of Enterprise Systems (ES), yet on average, the financial impact of ES adoption is essentially neutral. The authors propose that in an ES environment of easy information access, competitive success depends, in part, on the policies regulating enterprise information use. To...

    Provided By Reed Elsevier

  • White Papers // Jan 2009

    Lock-In Situations in Supply Chains: A Social Exchange Theoretic Study of Sourcing Arrangements in Buyer-supplier Relationships

    Social exchange theory is used to gain a better understanding of the relationship between a buyer and a supplier that is characterized by lock-in situations. The authors begin by reviewing the theoretical foundations of social exchange theory. Next, they use an illustrative multinational business example from a Danish Business Group...

    Provided By Reed Elsevier

  • White Papers // Sep 2010

    Ferret: An RFID-Enabled Pervasive Multimedia Application

    This paper presents the design and implementation of Ferret, a system for locating nomadic augmented with RFID tags and visually displaying them to a user in real-time. The authors present a novel algorithm to infer location of tagged objects using the location of a camera and reader that observes them....

    Provided By Reed Elsevier

  • White Papers // Aug 2009

    Supporting Real-Time Traffic in Multihop Vehicle-to-Infrastructure Networks

    In this paper, a new Controlled Vehicular Internet Access protocol with QoS support (CVIAQoS) is introduced. CVIA-QoS employs fixed gateways along the road which perform periodic admission control and scheduling decisions for the packet traffic in their service area. The CVIA-QoS protocol is based on Controlled Vehicular Internet Access (CVIA)...

    Provided By Reed Elsevier

  • White Papers // Nov 2009

    Sandpiper: Black-Box and Gray-Box Resource Management for Virtual Machines

    Virtualization can provide significant benefits in data centers by enabling dynamic virtual machine resizing and migration to eliminate hotspots. The authors present Sandpiper, a system that automates the task of monitoring and detecting hotspots, determining a new mapping of physical to virtual resources, resizing virtual machines to their new allocations,...

    Provided By Reed Elsevier

  • White Papers // Feb 2009

    On the Implications of Routing Metric Staleness in Delay Tolerant Networks

    Delay Tolerant Network (DTN) routing addresses challenges of providing end-to-end service where end-to-end data forwarding paths may not exist. The performance of current DTN routing protocols is often limited by routing metric "Staleness", i.e., routing information that becomes out-of-date or inaccurate because of long propagation delays. The previous work, ParaNets,...

    Provided By Reed Elsevier

  • White Papers // Jun 2008

    Vertical Dimensioning: A Novel DRR Implementation for Efficient Fair Queueing

    Fair bandwidth allocation is an important mechanism for traffic management in the Internet. Round robin schedulers, such as Deficit Round Robin (DRR), are well-suited for implementing fair queueing in multi-Gbps routers, as they schedule packets in constant time regardless of the total number of active flows. The main drawback of...

    Provided By Reed Elsevier

  • White Papers // Apr 2011

    An Improved Timestamp-Based Password Remote User Authentication Scheme

    In 2003, Shen et al proposed a timestamp-based password authentication scheme in which remote server does not need to store the passwords or verification table for users authentication. Unfortunately Wang and Li, E.J.Yoon, Lieu et al., analyzed independently the Shen Lin Scheme and were found to be vulnerable to some...

    Provided By Reed Elsevier

  • White Papers // Dec 2009

    Security Analysis of a Remote User Authentication Protocol by Liao and Wang

    In Elsevier's journal of Computer Standards & Interfaces, 2007, Liao and Wang proposed an authentication protocol using smart card and claimed that their protocol provides security against replay attacks, active attacks and insider attacks. In addition, they argued that user anonymity is guaranteed. In this paper, the authors point out...

    Provided By Reed Elsevier

  • White Papers // Sep 2010

    Virtualization Architecture Using the ID/Locator Split Concept for Future Wireless Networks (FWNs)

    Future Wireless Networks (FWNs) will be a convergence of many fixed and mobile networking technologies including cellular, wireless LANs, and traditional wired networks. This united ubiquitous network will consist of billions of networkable devices with different networking interfaces. A common networking protocol is required to communicate among these devices and...

    Provided By Reed Elsevier

  • White Papers // Feb 2011

    A Survey of QoE Assurance in Converged Networks

    High user satisfaction with using an application or service is the most meaningful quality evaluation criterion. For this reason the set of issues encompassed by the term Quality of Experience (QoE), i.e., the quality perceived subjectively by the end-user, is key to Internet service providers, network and software engineers, developers...

    Provided By Reed Elsevier

  • White Papers // Feb 2011

    Reinforcement Learning for Joint Radio Resource Management in LTE-UMTS Scenarios

    The limited availability of frequency bands and their capacity limitations, together with the constantly increasing demand for high-bit-rate services in wireless communication systems, require the use of smart radio resource management strategies to ensure that different services are provided with the required Quality of Service (QoS) and that the available...

    Provided By Reed Elsevier

  • White Papers // Feb 2011

    Context-Aware Media Independent Information Server for Optimized Seamless Handover Procedures

    The proliferation of the Internet and wireless access technologies introduced the constant mobile paradigm, in which users want to be always connected making use of the best available networks and technologies. In order to provide seamless connectivity among the new wireless access technologies, such as Wi-Fi, WiMAX and 3GPP (UMTS,...

    Provided By Reed Elsevier